Monday,
March 4, 2002
|
|
Compuquiz |
|
|
Compuquiz —
73
1. What do we call an
encryption/decryption key known only to the party or parties that
exchange secret messages?
2. Which kind of pad
was commonly used in cryptography during World War II?
3. Today, many Internet
businesses and users take advantage of cryptography based on which
approach?
4. What do we call the
issuer of a PKI certificate?
5. Name the most widely
used privacy ensuring program which was developed by Philip R.
Zimmermann?.
6. Which is the
encryption algorithm that will begin to supplant the Data Encryption
Standard (DES) - and later Triple DES - over the next few years as the
new standard encryption algorithm?
7. What do we call the
inclusion of a secret message in otherwise unencrypted text or images?
8. In password
protection, what is a random string of data used to modify a password
hash?
9. What is a mode of
operation for a block cipher, with the characteristic that each possible
block of plaintext has a defined corresponding ciphertext value and vice
versa?
10. Name the trial and
error method used to decode encrypted data through exhaustive effort
rather than employing intellectual strategies?
Answers to Compuquiz 71
1 .RAM (Random Accessed
Memory)
2. ROI (Return on
Investment)
3. ROM (Read Only
Memory)
4. Router
5. Search engine
6. Server
7. SGML (Standard
Generalised Mark-up Language)
8. Smart Card
9. Simple Mail Transfer
Protocol (SMTP). Sometimes also called Simple Mail Transport Protocol.
10. Software
The following are the
winners of Compuquiz 71
1.R. Karthik
New Delhi
2.Nitin Sharma
Panipat
3.Harjeet Chauhan
Nangla, Jhajjar
|